Where do today's computers store almost all motherboard configuration data?A) BIOS ROMB) CMOS RAMC) DIMM RAMD) Solid State Disk

Answers

Answer 1

Answer:

In the CMOS RAM

Explanation:

It's the only answer that is available. New computer's store the data in TPM (Trusted Platform Module) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

Answer 2

Today's computers store almost all motherboard configuration data in CMOS RAM (Complementary Metal-Oxide-Semiconductor Random Access Memory). (Option B)

How  is this so?

CMOS RAM is a type of non-volatile memory that retains data even when the computer is powered off. It is typically powered by a small battery on the motherboard.

The configuration data stored in CMOS RAM includes settings such as system date and time, boot order, hardware settings, and other BIOS (Basic Input/Output System) configurations.

Thus the correct answer is Option B - Complementary Metal-Oxide-Semiconductor Random Access Memory

Learn more about motherboard  at:

https://brainly.com/question/12795887

#SPJ6


Related Questions

Which delivery model is an example of a cloud computing environment that provides users with a web based email service?
a. SaaS
b. PaaS
c. IaaS

Answers

Answer:

a. SaaS

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service.

All the sentences below are missing one or more commas. By placing commas in the correct places, complete the following ten-question exercise. You may use The Writer' Reference handbook if needed.
1. Parents once automatically gave their children the father's surname but some no longer do.
2. Italians insist that Marco Polo the thirteenth-century explorer did not import pasta from China.
3. Prices having risen rapidly the government debated a price freeze.
4. A price rise unlike a rise in interest rates seemed a sure solution.
5. Shoes with high heels originated to protect feet from the mud garbage and animal waste in the streets.
6. The festival will hold a benefit dinner and performance on March 10 2011 in Ashville.
7. "In coming to a new land" says writing teacher Peter Elbow "you develop a new conception of what you are writing about."
8. Mr. Spock as chief science officer is also Captain Kirk's closest friend.
9. The quarterback told the tight end to sprint five yards juke to the inside then break for the right sideline.
10. Fielding the ball on three hops the shortstop fired a strike to first base for the final out.

Answers

Answer:

1. Parents once automatically gave their children the father's surname, but some no longer do.

2. Italians insist Marco Polo, the thirteenth-century explorer did not import pasta from China.

3. Prices, having risen rapidly, the government debated a price freeze.

4. A price rise, unlike a rise in interest rates, seemed a sure solution.

5. Shoes with high heels originated to protect feet from the mud, garbage, and animal waste in the streets.  

6. The festival will hold a benefit dinner, and performance on March 10, 2011, in Ashville.

7. "In coming to a new land," says writing teacher Peter Elbow, "you develop a new conception of what you are writing about."

8. Mr. Spock, as chief science officer, is also Captain Kirk's closest friend.

9. The quarterback told the tight end to sprint five yards juke to the inside, then break for the right sideline.

10. Fielding the ball on three hops, the shortstop fired a strike to first base for the final out.

The corrected sentences are :
1. Parents once automatically gave their children the father's surname, but some no longer do.

2. Italians insist Marco Polo, the thirteenth-century explorer did not import pasta from China.

3. Prices, having risen rapidly, the government debated a price freeze.

4. A price rise, unlike a rise in interest rates, seemed a sure solution.

5. Shoes with high heels originated to protect feet from the mud, garbage, and animal waste in the streets.  

6. The festival will hold a benefit dinner, and performance on March 10, 2011, in Ashville.

7. "In coming to a new land," says writing teacher Peter Elbow, "you develop a new conception of what you are writing about."

8. Mr. Spock, as chief science officer, is also Captain Kirk's closest friend.

9. The quarterback told the tight end to sprint five yards juke to the inside, then break for the right sideline.

10. Fielding the ball on three hops, the shortstop fired a strike to first base for the final out.

Why is punctuation crucial in sentence construction?

Punctuation is crucial in sentence construction because it helps convey meaning, clarify relationships between words and phrases, and create a clear and coherent flow of information.

Here are the places where the commas were placed -

Placed a comma after "surname" and before "but" to separate two independent clauses.Placed a comma after "explorer" to set off a non-essential phrase.Placed a comma after "rapidly" to indicate an introductory adverbial phrase.Placed commas before and after "unlike a rise in interest rates" as it's a non-restrictive clause.Placed commas after "mud" and "garbage" to separate items in a series.Placed a comma after "2011" to indicate the year in the date.Placed commas before and after "says writing teacher Peter Elbow" as it's a non-essential clause.Placed commas before and after "as chief science officer" to set off a non-restrictive phrase.Placed commas after "yards" and "inside" to separate items in a series.Placed a comma after "hops" to indicate an introductory participial phrase.

Learn more about sentences  at:

https://brainly.com/question/552895

#SPJ2

What are some options available when inserting an address block? Check all that apply. previewing postal code full address label margins matching fields company name paragraph formatting

Answers

Answer:

A. previewing

B. postal code

C. full address

E. matching fields

F. company name

Answer: A, B, C, E, F

Explanation:

Your welcome :)

how many bits do you need to count up to 30 help please

Answers

Answer:

5

Explanation:

2⁵ = 32, so that fits.

In general, to calculate the number of bits without guessing, you can take the 2 log of the number and then round up:

[tex]\log_2 30 \approx 4.9[/tex]

rounded up gives 5.

Image below please help

Answers

Answer:

Open original documentPlace cursorHighlight textCtrl+CSwitch to new documentCtrl+V

5. What happens when more than one keyword appears in a string? Consider the string "My mother has a dog but no cat." Explain how to prioritize responses in the reply method. Did this impact any changes you made to the getResponse method?

Answers

Answer:  

Please see below  

Explanation:  

When this is the case, the prioritizing will be done on the basis of whichever keyword came first in the string - it is that particular method that will be called. Hence, if you wish to prioritize the method available for pets over the method available for family, you will need to place it as such in the source code - and this is how the getResponse method will be impacted.

What is the full form of computer ​

Answers

Answer:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. Some people say that COMPUTER stands for Common Operating Machine Purposely Used for Technological and Educational Research.

Write an algorithm to settle the following question:
A bank account starts out with $10,000. Interest is compounded monthly at 6 percent per year (0.5 percent per month). Every month, $500 is withdrawn to meet college expenses. After how many years is the account depleted?

Here is what I got so far. Can you tell if I am on the right track.

Step 1 Start with the table:
Month Balance
0 $10,000.00


Step 2 Repeat steps 2a, 2b, 2c while the balance is greater than $0.00
Step 2a. Add a new row to the table.
Step 2b. In column 1 of the new row, labeled "Month", put one more than the preceding month value.
Step 2c. In column 2 of the new row, labeled "Balance", place the value of this formula
b * (1 + 0.005) - 500
where b is the preceding balance value.


Step 3 Read the last number in the month column (let's call it months). Report that the account will be depleted in (months / 12) years and (months % 12) months.

Answers

Answer:

algorithm

original = float(raw_input("Enter initial balance: "))

interest = float(raw_input("Enter promised return: "))

expenses = float(raw_input("Enter monthly expenses: "))

interest = interest / 100 / 12

month = 0

balance = original

if balance * interest - expenses >= 0:

print "You don't need to worry."

else:

while balance + balance * interest - expenses >= 0: # negation of the if condition

balance = balance + interest * balance # in one month

balance = balance - expenses

month = month + 1

print month, balance

print month / 12, "years and", month % 12, "months"

Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safety?
O A database software
OB
presentation software
OC. anti-virus software
OD
graphics software

Answers

Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safety?

O A database software

OB

presentation software

OC. anti-virus software

OD

graphics software

Answer: OC

Write a Python program that prints your name, CS classes taken (or other relevant experience), and the date on separate lines. Use one variable each for the month, day, and year (3 total). Make sure there are no spaces between the forward slash and numbers. Submit the .py file. Sample Run: My name is Steven Allbee I have taken CS 10 - Python Programming Today's date is 1/17/19

Answers

Answer:

The program in Python is as follows:

name = input("Name: ")

course = input("Course: ")

month = input("Month: ")

day = input("Day: ")

year = input("Year: ")

ddate = (month+"/"+day+"/"+year).replace(" ", "")

print("My name is ",name)

print("I have taken  ",course)

print("Today's date is ",ddate)

Explanation:

This line prompts user for name

name = input("Name: ")

This line prompts user for course classes taken

course = input("Course: ")

This line prompts user for month

month = input("Month: ")

This line prompts user for day

day = input("Day: ")

This line prompts user for year

year = input("Year: ")

This line calculates the date and remove all blank spaces

ddate = (month+"/"+day+"/"+year).replace(" ", "")

The next three lines print the user inputs

print("My name is ",name)

print("I have taken  ",course)

print("Today's date is ",ddate)

What must you do in Disk Management so that File Explorer can recognize and use a new hard disk?

Answers

Answer: Create a new Volume/Partition

Explanation:

Typically, you want to make sure your drive is formatted and create a new volume span containing your drive space. For your PC to recognize the drive, it must be connected via SATA power and data. If it doesn't detect the drive otherwise, check if it has drivers installed in Device Manager. Go through the partition wizard to format your drive and mount a letter. After that it should be usable upon completion.

Which type of input peripheral is most prevalent in a Point of Sale system?A. External USB storage.
B. Card reader.
C. Thermal receipt printer.
D. Projector.

Answers

Answer:

B. Card reader.

Explanation:

The point of sale system is the point where the customer purchased the product and at the same time they given the money so here the time and place should be recorded also the retail transaction is also completed. Here it represents the amount in an invoice prepared by the store and also presents the varies of options for payment through which the customer could choose it

basically it is the place where the products is purchased and the payment is made along with it the taxes are also applicable

So in the given situation, the option B is correct as it derives the input peripheral

The type of input peripheral that is most prevalent in a Point of Sale (POS) system is a: B. Card reader.

What is an input peripheral?

An input peripheral can be defined as an electronic device that is typically designed and developed for sending data to a computer system such as a Point of Sale (POS). Thus, it is used for entering data (information) into a computer system.

The examples of input peripherals.

In Computer technology, some examples of input peripherals include the following:

MouseScannerMicrophoneKeyboardCard reader

A card reader is a type of input peripheral that is used in a Point of Sale (POS) system to receive payments in e-commerce stores or markets, especially by inserting or swiping a credit card in the Point of Sale (POS) system.

Read more on input peripheral here: https://brainly.com/question/5430107

Suppose you own a travel agency in a large city. You have many corporate clients, but growth has slowed somewhat Some long-term employees are getting discouraged, but you feel that there might be a way to make technology work in your favor. Use your imagination and suggest at least one strength, weakness, opportunity, and threat that your business faces.

Answers

Explanation:

For any business or organisation, a strategic planning is a road map leading to a successful future. SWOT planning and analysis makes contribution to that strategic planning processes by identifying the various labor, technical and financial resources. SWOT stands for --

S - Strength

W - Weakness

O - Opportunity

T - Threat

One such strength of our business is we have a great and commendable employee retention.

Weakness is that we have not utilize technology properly to attract the customers. Also we need to update to our software.

An opportunity is that we can explore many technological solutions for the problems that causes growth issues. Also we can be the first in the niche market to use such technologies thus attracting customers.

And a threat is that we adapting to changing internet and as well as technology climate can lead to our business failing.

Assign searchResult with a pointer to any instance of searchChar in personName.
#include
#include
int main(void) {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = NULL;
/* Your solution goes here */
if (searchResult != NULL) {
printf("Character found.\n");
}
else {
printf("Character not found.\n");
}
return 0;
}

Answers

Answer:  

Here it the solution statement:  

searchResult = strchr(personName, searchChar);  

This statement uses strchr function which is used to find the occurrence of a character (searchChar) in a string (personName). The result is assigned to searchResult.

Headerfile cstring is included in order to use this method.

Explanation:  

Here is the complete program

#include<iostream> //to use input output functions  

#include <cstring> //to use strchr function  

using namespace std; //to access objects like cin cout  

int main() { // start of main() function body  

  char personName[100]; //char type array that holds person name  

  char searchChar; //stores character to be searched in personName

  char* searchResult = nullptr; // pointer. This statement is same as searchResult  = NULL    

  cin.getline(personName, 100); //reads the input string i.e. person name  

  cin >> searchChar;    // reads the value of searchChar which is the character to be searched in personName  

  /* Your solution goes here */  

  searchResult = strchr(personName, searchChar); //find the first occurrence of a searchChar in personName  

  if (searchResult != nullptr) //if searchResult is not equal to nullptr  

  {cout << "Character found." << endl;} //displays character found

  else //if searchResult is equal to null  

  {cout << "Character not found." << endl;} // displays Character not found  

  return 0;}  

For example the user enters the following string as personName  

Albert Johnson  

and user enters the searchChar as:  

J

Then the strchr() searches the first occurrence of J in AlbertJohnson.  

The above program gives the following output:  

Character found.

At its most basic level, data is stored as binary numbers.
O False
O True

Answers

Answer: Binary numbers

Hope this helps!

(Please mark Brainliest!)

Answer:

True

Explanation:

Which guidelines should be used to make formatting tasks more efficient?

Answers

Answer:

Use pasted text only; this does not keep the original formatting.

Explanation:

If the <em> tags are around a word then it will be ____​

Answers

Answer: The HTML <em> tag represents stress emphasis of its contents. The <em> tag is used when you need to emphasize a particular word or phrase within a sentence. The placement of stress emphasis changes the meaning of the sentence. Also see the <strong> and <b> tags.

hopefully this helps, sorry if i'm off

chemical reaction to metal​

Answers

Answer:

Metals can react with water, acid and oxygen. The reactivity of the metal determines which reactions the metal participates in.

Explanation:

In general, acids react with metals to give salt and release hydrogen gas. In general, bases do not react with metals and release hydrogen gas.When metals react with other substances, the metal atoms lose electrons to form positive ions .

How many fixes are available for Adobe Photoshop CS4 (64 Bit)?

Answers

Answer:

There are three (3) fixes in adobe cs4.

Explanation:

Adobe photoshop cs4 is a version of the creative cloud's professional graphic applications used to edit pictures, design interfaces, make graphical illustrations, draw and animate the drawings, etc.

It can be installed in several computer operating system platforms like linux, mac and windows. The adobe photoshop cs4 doesn't support the windows installation and might run into several issues. There are other issues in other supported platforms, but unlike for windows, there are three fixes for these problems.

Which of the following best describes how computing devices represent information?
A. A computer will either represent information as bits or bytes but not both
B. A computer represents data as a byte which is either a 0 or a 1
C. A computer represents data as bits which is either a 0 or a 1
D. A computer represents information as bits which contain 8 bytes.

Answers

Answer:

The answer is "C"

Explanation:

In the computer system, the data which separates a data object into relevant concepts is known as data representation. In the representation of data, it uses the binary digits, that are in the form of '0 and 1'. It is used by computers to store information and these numbers are also known as bits, and wrong choices can be defines as follows:

In option A, It is wrong because when we see the file details it shows both. In option B, It's incorrect because the smallest unit of data representation is bits. In option D, It is incorrect because bits includes only "0 and 1".

All of the data stored and transmitted by digital devices is encoded as bits.A. TrueB. False

Answers

Answer:

A. True

Explanation:

A digital device is an electronic device that has the ability and capability to receive, store, process and transmit data to another device.

Since the processing device in the digital device understands only zeros and ones which are binary numbers (also called bits), transmission and storage of data in these devices should be encoded in bits.

Examples of digital devices are;

i. flash drives

ii. mobile phones

iii. speakers

iv. printers

v. scanners

Which of the following type of online advertising intermediaries decide the placement and pricing of online display ads by using the supply and demand of the ad landscape in a real- time auction process?
a. Ad networks
b. Retargeters
c. Content publishers
d. Data providers
e. Ad exchanges

Answers

Answer:

e. Ad exchanges

Explanation:

The ad exchange is a form of an online strategy that promotes the transaction of media advertising inventory from numerous ad networks. Here, prices for the inventory are defined through the supply and demand in a real-time auction system.

Hence, in this case, the correct answer is that the type of online advertising intermediaries is generally referred to as Ad Exchanges.

A type of online advertising intermediaries that can be decided ivia placement and pricing of online display ads is Ad Exchangers.

What is an ad exchanger?

An ad exchange is known to be a type of technology methods that is often used when buyers and sellers tries to connect so that they can sell and purchase ad goods.

Note that it is the one that acts as a middleman in the advertising transaction means that exit between supply side platforms (SSPs) (publishers) and demand side platforms (DSPs) (brands).

Learn more about Ads from

https://brainly.com/question/1658517

Which XP practice prescribes that "the code [always be] written by two programmers at one machine"?.

Answers

Answer:

Pair Programming

Explanation:

In Extreme Programming XP, pair programming is a practice in which two programmers work together in a pair at one machine, when writing a code.

One of the two programmers is called the "driver" or developer who writes the code and supervises all the changes made to the program.

The other one is called an "navigator" or observer who provides ideas on how the program should be written, observes or reviews it the program, identify the issues or errors in the code, help in code simplifications.

The two developers implements the program, do coding, review the program and check each other's work. They both are required to be equally skilled in order to implement and test the code. This improves the process of the software development. By working in a pair and reviewing and testing the code together, they develop a better code.

Hope wants to add a third use at the end of her
nitrogen list.
What should Hope do first?
f
What is Hope's next step?

Answers

Answer:

Put her insertion point at the end of the item 2b.

Press the enter key.

Explanation:

answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in audiovisual technology is most closely related to this? soundtracks newsreels microphones televisions

Answers

Maybe it is the telephone

Assume that IBM has a relatively low unit market share for blockchain technology and that the blockchain technology industry’s growth rate is extremely high (averaging 30% per year). Using the BCG business portfolio analysis framework, blockchain technology would be classified as a ________ SBU for IBM.

Answers

Answer:

The blockchain technology would be classified as a Question Mark strategic business unit (SBU)

Explanation:

The Boston Consulting Group Matrix was first developed towards the end of the nineteenth century for use in analysing the performance and classifying products and business units.

This tool is still very relevant today.

The Matrix is made up of four quadrants:

Top Left - Question Mark

Top Right - Star

Bottom Left -  Dog

Bottom Right -  Cashcow

A Question Mark product or business unit is one which at the onset has a very little market share in an environment with a high growth rate. It is at the onset also characterised by losses and will need more time and money for it to bloom. If invested and nurtured can become a start and then a cash cow. There is also a risk that it will end up a white elephant business unit or product if it is not nurtured properly thus leading to losses.

Cheers!

In this assignment, you will write a Python 3.x program to calculate the length of the hypotenuse (side C) of a right triangle, given the lengths of the other two sides (A & B) as provided by the user. The program will also calculate the area of the triangle and the perimeter (the sum of the three sides). Other specifications: WRITE THE CODE FOR THE ANSWER.

Answers

Answer:

Explanation:

from math import hypot #import hypot for finding the hypotenuse

a = int(input("Enter a value for a: " )

b = int(input("Enter a value for b: " )

def find_hypotenuse(a,b):

return hypot(a,b) #find the hypotenuse

def find_area(a,b):

return 0.5 * a * b #calculate the area

def find_perimeter(a,b):

return a + b + find_hypotenuse(a,b) #calculate the perimeter

print("the hypotenuse is :", find_hypotenuse(a,b))

print("the area is :", find_area(a,b))

print("the perimeter is :", find_perimeter(a,b))

______was developed as an interim management protocol with OSI as the ultimate network management protocol.

Answers

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

In real-world environments, once the domains that are affected by the risks are identified, subsequent next steps would include:______.

Answers

Answer:

Explanation:

In real-world environments, once the domains that are affected by the risks are identified, subsequent next steps would include selecting, implementing, and testing controls to minimize or eliminate those risks.

In which architecture is the application logic usually on the client side?

Answers

Answer:

two-tier architecture

Explanation:

A two-tier architecture is a term often used in computer operation, that describes a form of software architecture that comprises a presentation tier or window outlook that operates from the client-side, while on the server-side, a data outlook or data configuration is saved. An example is platform architecture.

Hence, two-tier architecture is a form of architecture in which the application logic is usually on the client-side

Other Questions
What core principles of government did England violate, leading the American colonists to rebel? Why was Catherine the Great's monarchy viewed as ruthless? Allen and Renaldo are gaining weight for basketball season. Allen weighs178 pounds and is gaining three pounds per week. Renaldo weighs203 pounds but is gaining two pounds per week.Part A: In how many weeks will they both weigh the same amount? The answers to 1 through 8 What is an example of a concentric contraction What type of movement is running?O LocomotiveO BallisticO StaticOFine Twitch tengo unas preguntas sobre Simil,metfora, personalizacin y hiprboleY todo el mundo se rea_______Una vez ms la escuela abre sus brazos para recibirlos______Ro hombre pero hombre con pureza de ro_____ XYZ Escrow has gone out of business. They committed one of THE violations of all violations of escrow holder regulations. What is the violation? ce 8 AWhat is the purpose of a reference point?O to provide a standard system of measurementO to establish a point from which to measure future distance, or if movement has occurredO to determine the speed of an object in miles per hourO to provide a standard from which to evaluate variables in an experiment what are the advantage of farming and domestication Is 500mL greater than 5L Can someone help please two thirds as many books b. Translate into algebraic expression plz Excerpt from Richard Cory Edward Arlington Robinson Whenever Richard Cory went down town, We people on the pavement looked at him: He was a gentleman from sole to crown, Clean favored, and imperially slim. And he was always quietly arrayed, 5 And he was always human when he talked; But still he fluttered pulses when he said, "Good-morning," and he glittered when he walked. And he was rich, -- yes, richer than a king, -- And admirably schooled in every grace: 10 In fine, we thought that he was everything, To make us wish that we were in his place. So on we worked, and waited for the light, And went without the meat, and cursed the bread; And Richard Cory, one calm summer night, 15 Went home and put a bullet through his head. Which of these BEST expresses the theme of this passage? A) Greed and pride are evils which can destroy anyone. B) Suffering is unavoidable and should simply be accepted. C) Things in life and with people are often not as they seem. D) Suffering is a drain on an individual's spirit and should be avoided as much as possible. In a molecule of water, the electrons are more strongly attracted to the hydrogen nuclei than to the oxygen nucleus. Therefore electrons spend more time near the hydrogen nuclei and there is an unequal sharing of electrons.A. TrueB. False what is meant by pressure?write its unit. Does seeking a personal philosophy of the meaning of life-grapple with such questions as "How do I know that what I believe is true?", How does the existence of a site like Cactus Hill demonstrate the challenges that archaeologists face when making theories? Write a one or two sentence response. How did horses come to be ? A person who moves from place to place is called a